Author:
Faiqurahman Mahar,Syaifuddin S.
Reference16 articles.
1. T. Campbell, R. M., Padayachee, K., & Masombuka, “A survey of honeypot research: Trends and opportunities,” 2015 10th international conference for internet technology and secured transactions (ICITST) IEEE, 208–212 (2015).
2. M. Nawrocki, M. Wählisch, T. C. Schmidt, C. Keil, and J. Schönfelder, “A Survey on Honeypot Software and Data Analysis,” CoRR, abs/1608.06249 (2016).
3. A. Singh, R. J.-S. Processing, U. Communication, and U. 2011, “A honeypot system for efficient capture and analysis of network attack traffic,” 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies, IEEE, 514–519 (2011).
4. S. Kumar, P. Singh, … R. S.-I. J. of, and U. 2012, “Distributed honeynet system using gen iii virtual honeynet,” International Journal of Computer Theory and Engineering, 4, (4) (2012).
5. C. Moore and A. Al-Nemrat, “An analysis of honeypot programs and the attack data collected,” International Conference on Global Security, Safety, and Sustainability, 228–238 (2015).
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献